亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-roadmap-09.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁(yè) / 共 5 頁(yè)
字號(hào):
     - Top CA - A CA that is at the top of a PKI hierarchy. Note: This        is often also called a "Root CA," since in data structures terms        and in graph theory, the node at the top of a tree is the        "root." However, to minimize confusion in this document, we        elect to call this node a "Top CA," and reserve "Root CA" where        there is a single CA directly trusted by the EE. Readers new to        PKIX should be aware that these terms are not used consistently        throughout the PKIX documents, as the Internet PKI profile        [2459bis] uses "Root CA" to refer to what this and other        documents call a "Top CA," and "most-trusted CA" to refer to        what this and other documents call a "Root CA."         1.3 History        The PKIX working group was formed in October of 1995 to develop    Internet standards necessary to support PKIs. The first work item was    a profile of the ITU-T Recommendation X.509 PKC [FORMAT]. X.509,    which is a widely accepted basis for a PKI, including data formats    and procedures related to distribution of public keys via PKCs    digitally signed by CAs. X.509 does not however include a profile to    specify the support requirements for many of the PKC data structure's    sub- fields, for any of the extensions, nor for certain data values.    The Internet PKI profile [FORMAT] went through many draft versions    before becoming an RFC. Other profiles have been developed in PKIX    for particular algorithms to make use of the Internet PKI Profile    [FORMAT]. There has been no sense of conflict between the authors    that developed these profiles as they are seen as complimentary. The    Internet PKI profile has been a draft standard for more than six  Arsenault, Turner                                                    5  Internet-Draft                PKIX Roadmap                  July 2002    months and is currently going through an update process to clarify    any inconsistencies and to bolster certain sections, see [2459bis].        In parallel with the profile development, work was undertaken to    develop the protocols necessary to manage PKI-related information    was. The first developed was the Certificate Management Protocol    (CMP). It defines a message protocol to initialize, certify, update,    and revoke PKI entities [CMP]. The demand for an enrollment protocol    and the desire to use PKCS-10 message format as the certificate    request syntax lead to the development of two different documents in    two different groups. The Certificate Request Syntax (CRS) draft was    developed in the SMIME WG which used PKCS-10 [PKCS10] as the    certification request message format. Certificate Request Message    Format [CRMF] draft was also developed but in the PKIX WG. It was to    define a simple enrollment protocol that would subsume both the CMP    and CRS enrollment protocols, but it did not use PKCS-10 as the    certificate request message format. Then the certificate management    message format document, was developed to define an extended set of    management messages that flow between the components of the Internet    PKI. Certificate Management Messages over CMS (CMC) was developed to    allow the use of an existing protocol (S/MIME) as a PKI management    protocol, without requiring the development of an entirely new    protocol such as CMP [CMC]. It also included [PKCS10] as the    certificate request syntax, which caused work on the CRS draft to    stop. Information from the certificate management message format    document was moved into [CMP] and [CMC] so work on the certificate    management message format document was discontinued. After some    operational experience with [CMP], two drafts, one for using HTTP as    the transport protocol and one for Transmission Control Protocol    (TCP), were written to solve problems encountered by implementors.    These drafts were merged into one draft Transport Protocols for CMP    [TPCMP]. [CMP] has been a draft standard for more than six months and    is currently undergoing revisions to document. The transport section    has been removed and will remain in [TPCMP].        Another long debated topic in the WG dealt with certificate    revocation. Numerous drafts have been developed to address different    issues related certificate revocations. CMP supports revocation    request, response, revocation announcement, and requests for CRL    messages. CMC defines revocation request, revocation response, and    requests for CRL messages, but uses CMS as the encapsulating    protocol. [OCSP] was developed to address concerns that not all    relying parties want to go through the process checking CRLs from    every CA in the certification path. It defines an on-line mechanism    to determine the status of a given certificate, which may provide    more timely revocation information than is possible with CRLs. The    Simple Certification Verification Protocol (SCVP) was produced to    allow relying parties to off-load all of their certification    verification to another entity [SCVP]. The WG was arguably split over    whether such a function should be supported and whether it should be    its own protocol or included in OCSP. In response, a draft defining    OCSP Extensions was produced to include the functions of SCVP. [OCSP]    has been a draft standard for more than six months and is in the  Arsenault, Turner                                                    6  Internet-Draft                PKIX Roadmap                  July 2002    process of being revised [OCSPv2]. To capture the work from the OCSP    Extensions, two drafts were developed: Delegated Path Validation    [DPV] and Delegated Path Discovery [DPD]. The WG recognizes an eed to    address online delegated path validation and delegated path    discovery. At least three candidates currently exist. There are:    OCSPv2, SCVP, and DVCS. Given this multiplicity, the WG undertook to    produce [DPREQ] in order to factilate selection from among these or    possibly others.        One other certificate status draft called Open CRL Distribution Point    (OCDP) was produced which documented two extensions: one to support    an alternative CRL partitioning mechanism to the CRL Distribution    Point mechanism documented in the Internet PKI Profile [FORMAT] and    one to support identifying other revocation sources available to    certificate-users. The work from this draft was subsumed by an ITU-T    | ISO/IEC Amendment to X.509, hence work on this draft was halted.        Development of the operational protocols has been slightly more    straightforward. Four documents for the Light Weight Directory Access    Protocol (LDAP) have been developed one for defining LDAPv2 as an    access protocol to repositories [PKI-LDAPv2]; two for storing PKI    information in an directory [SCHEMA] and [ADDSCHEMA]; and one for    LDAPv3 requirements for PKI [PKI-LDAPv3]. Using the File Transfer    Protocol (FTP) and the Hyper Text Transmission Protocol (HTTP) to    retrieve PKCs and CRLs from PKI repositories was documented in    [FTPHTTP]. Recognizing that LDAP directories are not the only    repository service, the working group draft a Repository Locator    Service [RLS] to make use of DNS SRV records to locate where and how    PKI information can be retrieved from a repository.        In late 1998 the PKIX charter was revised to include protocols for    time stamping and data certification services. [TSP] was developed to    define protocols required to interact with a Time Stamp Authority    (TSA) who asserts that a datum existed priot to a given time. [DVCS]    allows to verify and assert the validity of all signatures attached    to the signed document using all appropriate status information and    PKCs or to verify and assert the validity of one or more PKCs at the    specified time. Both [DVCS] and [TSP] use [CMS] as an encapsulating    mechanism (though in [TSP] request for a time stamp are not required    to use [CMS]). A draft for extending trust in tokens in time was    developed to use [DCVS] to maintain the trust in a token issued by a    non- repudiation Trusted Third Party (NR TTP) after the key initially    used to establish trust in the token expires; however, this draft has    expired. The [TRNRS] draft was developed to describe those features    of a service which processes signed documents that must be present in    order for that service to constitute a "technical non- repudiation"    service.        Around the same time, a work item for ACs, defined in [X.509], was    added. ACs are similar to PKCs, but they do not bind public keys to    identities rather they bind attributes to identities. The attributes    bound to the identity can represent anything, but are mostly used to    support rule-based and role-based access control decisions. Two  Arsenault, Turner                                                    7  Internet-Draft                PKIX Roadmap                  July 2002    drafts have since been developed: the Internet Attribute Certificates    Profile for Authorizations [AC] and the Limited Attribute Certificate    Acquisition Protocol [LAAP]. The first profiles the fields and    extensions of the AC and the second provides a deliberately limited    protocol to access a repository when LDAP is not appropriate.        Other drafts have been produced to address specific issues. [DHPOP]    was developed to define two mechanisms by which a signature can    produced using a Diffie-Hellman pair. This draft provides a mechanism    to use Diffie-Hellam key pairs to authenticate a PKCS-10    certification request. [REP] was developed during the revision to the    Internet PKI Profile [FORMAT] to separate the definitions of the    object identifiers and encoding rules for keys and digital signatures    in PKCs. The Qualified Certificates [QC] and Permanent Identifier    [PI] drafts were developed to address naming issues.        From the alphabet soup above, it is clear why this roadmap is    required.         2 PKI     2.1 Theory        At the heart of recent efforts to improve Internet security are a    group of security protocols such as Secure Multipurpose Internet Mail    Extensions (S/MIME), Transport Layer Security (TLS), and Internet    Protocol Security (IPSec). All of these protocols rely on public-key    cryptography to provide services such as confidentiality, data    integrity, data origin authentication, and non-repudiation. The    purpose of a PKI is to provide trusted and efficient key and public    key certificate management, thus enabling the use of authentication,    non-repudiation, and confidentiality.        Users of public key-based systems must be confident that, any time    they rely on a public key, the subject that they are communicating    with owns the associated private key, this applies whether an    encryption or digital signature mechanism is used. This confidence is    obtained through the use of PKCs, which are data structures that bind    public key values to subjects. The binding is achieved by having a    trusted CA verify the subject's identity and digitally sign each PKC.        A PKC has a limited valid lifetime, which is indicated in its signed    contents. Because a PKC's signature and timeliness can be    independently checked by a certificate-using client, PKCs can be    distributed via untrusted communications and server systems, and can    be cached in unsecured storage in certificate-using systems.        PKCs are used in the process of validating signed data. Specifics    vary according to which algorithm is used, but the general process    works as follows (Note: there is no specific order in which the    checks listed below must be made; implementors are free to implement    them in the most efficient way for their systems):  Arsenault, Turner                                                    8  Internet-Draft                PKIX Roadmap                  July 2002          - The recipient of signed data verifies that the claimed identity        of the user is in accordance with the identity contained in the        PKC;            - The recipient validates that no PKC in the path is revoked (e.g.,        by retrieving a suitably-current Certificate Revocation List        (CRL) or querying an on-line certificate status responder), and        that all PKCs are within their validity periods at the time the        data was signed;            - The recipient verifies that the data are not claimed to have any        values for which the PKC indicates that the signer is not        authorized;            - The recipient verifies that the data have not been altered since        signing, by using the public key in the PKC.            - If all of these checks pass, the recipient can accept that the        data was signed by the purported signer. The process for keys        used for encryption is similar.        Note: It is of course possible that the data was signed by someone    very different from the signer, if for example the purported signer's    private key was compromised. Security depends on all parts of the    certificate-using system, including but not limited to: physical    security of the place the computer resides; personnel security (i.e.,    the trustworthiness of the people who actually develop, install, run,    and maintain the system); the security provided by the operating    system on which the private key is used; and the security provided    the CA. A failure in any one of these areas can cause the entire    system security to fail. PKIX is limited in scope, however, and only    directly addresses issues related to the operation of the PKI    subsystem. For guidance in many of the other areas, see [POLPROC].         2.2 Architecture Model        A PKI is defined as:        The set of hardware, software, people, policies and procedures needed    to create, manage, store, distribute, and revoke PKCs based on    public-key cryptography.        A PKI consists of five types of components [MISPC]:          - Certification Authorities (CAs) that issue and revoke PKCs;            - Organizational Registration Authorities (ORAs) that vouch for the        binding between public keys and certificate holder identities 

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99久久国产综合精品色伊| 国产综合成人久久大片91| av高清久久久| 亚洲精品成人精品456| 在线视频亚洲一区| 亚洲一区二区三区爽爽爽爽爽| www.日韩在线| 国内欧美视频一区二区| 亚洲综合另类小说| 国产精品久久久久影视| 欧美一区二区三区啪啪| 色噜噜狠狠成人中文综合| 国内不卡的二区三区中文字幕| 欧美极品aⅴ影院| 欧美大片日本大片免费观看| 欧美视频精品在线观看| 不卡一区二区中文字幕| 国产在线精品一区在线观看麻豆| 天天色综合成人网| 亚洲美女少妇撒尿| 国产精品日韩成人| 国产午夜亚洲精品不卡 | 日韩一级免费观看| 日本丶国产丶欧美色综合| av影院午夜一区| 国产99久久久精品| 黄一区二区三区| 国产在线国偷精品产拍免费yy| 免费高清视频精品| 三级一区在线视频先锋| 亚洲免费在线视频一区 二区| 精品国产乱码久久久久久老虎| 99免费精品在线| 午夜精品福利视频网站| 亚洲综合区在线| 最新中文字幕一区二区三区| 日韩美女视频在线| 欧美日韩精品电影| 欧美日韩国产一级片| 欧美在线看片a免费观看| 一本色道久久综合狠狠躁的推荐| 成人午夜碰碰视频| 99v久久综合狠狠综合久久| 一本色道久久综合亚洲91 | 久久精品人人做| 日韩一级完整毛片| 日韩女优av电影| 色综合色狠狠天天综合色| 成人精品亚洲人成在线| 国产麻豆91精品| 麻豆一区二区99久久久久| 一区二区三区日韩在线观看| 国产婷婷色一区二区三区四区| 日韩小视频在线观看专区| 日本二三区不卡| 666欧美在线视频| 日韩美女一区二区三区四区| 2017欧美狠狠色| 日本一区二区免费在线| 中文字幕亚洲精品在线观看| 一区二区日韩av| 免费成人在线视频观看| 国产成人综合亚洲91猫咪| 成人18精品视频| 欧美三级日韩三级| 91免费版在线| 欧美日韩中文国产| 精品国产乱码久久久久久图片 | 欧美日韩五月天| 日韩一区二区免费在线观看| 精品久久久三级丝袜| 国产精品美日韩| 亚洲成人激情自拍| 国产盗摄视频一区二区三区| 色88888久久久久久影院按摩 | 欧美唯美清纯偷拍| 精品国产一区二区三区忘忧草| 久久色成人在线| 亚洲综合一区二区精品导航| 日韩成人伦理电影在线观看| 国产精品一品视频| 欧美日韩一区高清| 久久久久久久综合色一本| 一区二区三区四区视频精品免费| 蜜桃av噜噜一区| 91麻豆免费观看| 欧美精品一区二区高清在线观看 | 久久久久久夜精品精品免费| 一二三四社区欧美黄| 国产在线乱码一区二区三区| 欧美在线播放高清精品| 国产日韩综合av| 日本美女视频一区二区| aa级大片欧美| 精品国产区一区| 亚洲成年人网站在线观看| 丁香婷婷综合激情五月色| 欧美日韩国产美女| 亚洲久本草在线中文字幕| 国产成人夜色高潮福利影视| 欧美久久久久久蜜桃| 最好看的中文字幕久久| 国产专区欧美精品| 欧美一区二区大片| 亚洲一区二区影院| 91亚洲午夜精品久久久久久| 国产日韩av一区二区| 麻豆国产欧美日韩综合精品二区| 欧美性大战xxxxx久久久| 亚洲欧洲成人自拍| 国产精品1区2区| 欧美精品一区二区在线播放| 亚洲精品国产无套在线观| 成人精品免费看| 国产亚洲人成网站| 麻豆91精品91久久久的内涵| 欧美日韩不卡一区二区| 亚洲精品高清在线| 91丨porny丨首页| 国产精品久久综合| 成人av免费在线播放| 欧美韩日一区二区三区| 国产91精品免费| 国产日韩视频一区二区三区| 国产在线精品一区二区夜色| 久久理论电影网| 久久99深爱久久99精品| 日韩午夜在线影院| 看电影不卡的网站| 欧美大尺度电影在线| 蜜桃精品在线观看| 精品国产91亚洲一区二区三区婷婷| 美腿丝袜亚洲色图| 精品国产乱码久久久久久图片 | 欧美大片一区二区三区| 久久精品国产秦先生| 日韩欧美中文字幕制服| 久久精品国产99久久6| 欧美一区二区三区视频在线 | 久久精品夜色噜噜亚洲a∨| 国产另类ts人妖一区二区| 国产欧美视频一区二区三区| 国产99一区视频免费| 国产精品久久久一区麻豆最新章节| 成人黄色小视频在线观看| 中文字幕一区二区三区蜜月| 99精品欧美一区| 亚洲在线成人精品| 91精品国产色综合久久不卡电影| 蜜臀av性久久久久av蜜臀妖精 | 亚洲天堂网中文字| 欧美亚日韩国产aⅴ精品中极品| 亚洲国产精品综合小说图片区| 欧美军同video69gay| 免费在线一区观看| 久久久久久久国产精品影院| 成人免费视频app| 亚洲国产精品影院| 欧美大肚乱孕交hd孕妇| 成人丝袜视频网| 亚洲成人久久影院| 久久综合狠狠综合| 色婷婷综合久色| 麻豆91在线看| 亚洲日本va午夜在线电影| 欧美军同video69gay| 国产专区欧美精品| 一区二区三区国产精华| 欧美一区二区三区在线视频| 国产91精品欧美| 亚洲成人一二三| 久久蜜臀精品av| 欧美性受xxxx| 国产精品香蕉一区二区三区| 亚洲人妖av一区二区| 91精品久久久久久蜜臀| 成人精品免费视频| 日日夜夜精品视频免费| 国产日韩欧美a| 欧美日韩一区久久| 成人影视亚洲图片在线| 日本亚洲最大的色成网站www| 国产欧美日韩另类视频免费观看| 欧美性受xxxx黑人xyx| 国产乱子伦一区二区三区国色天香| 亚洲男人天堂av网| 精品国内二区三区| 欧美精品自拍偷拍| 91网站在线播放| 国产麻豆日韩欧美久久| 亚洲gay无套男同| 国产精品久久久久久久久动漫| 欧美一级欧美一级在线播放| 色诱视频网站一区| 国产成人在线视频网站| 日本三级韩国三级欧美三级| 综合av第一页| 国产午夜精品久久久久久免费视| 91精品国产综合久久精品| 在线免费观看一区|